Friday, 27 Mar 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Global Market > DEF CON research takes aim at ZTNA, calls it a bust
Global Market

DEF CON research takes aim at ZTNA, calls it a bust

Last updated: August 18, 2025 6:45 am
Published August 18, 2025
Share
Shutterstock
SHARE

Main vendor vulnerabilities span authentication and design flaws

The analysis uncovered essential vulnerabilities throughout Verify Level, Zscaler and Netskope that fell into three main classes: authentication bypasses, credential storage failures and cross-tenant exploitation.

Authentication bypass vulnerabilities

Zscaler’s SAML implementation contained essentially the most extreme authentication flaw. The researchers found that the signature on the SAML assertion was solely checked for presence, and it wasn’t validated in opposition to the identification supplier’s public key. This allowed full bypass of identification supplier authentication by forging SAML responses with invalid signatures.

Netskope suffered from an identical however extra basic bypass. The enrollment API required no authentication, permitting attackers to register gadgets utilizing solely leaked group keys and legitimate electronic mail addresses. 

Verify Level’s vulnerability centered on hard-coded encryption keys embedded in consumer binaries. These keys protected diagnostic log uploads containing JSON Internet Tokens (JWTs) that lived for 30 days creating a possible compromise situation for any buyer who had uploaded logs to help.

Credential storage and token administration flaws

All three distributors applied weak credential storage mechanisms. Zscaler saved Machine Token Authentication credentials in Home windows registry in clear textual content, permitting native attackers to extract tokens and impersonate any consumer by modifying registry values. Netskope’s “Safe Enrollment” tokens used DPAPI encryption with inadequate safety.

Vendor response and remediation

Vendor responses different considerably in velocity and effectiveness. In line with the researchers, Zscaler responded most quickly, initially patching their SAML vulnerability (CVE-2025-54982) inside 4 hours. Nevertheless, the repair launched compatibility points requiring a rollback earlier than a everlasting answer was applied.

See also  Mistral's Le Chat adds deep research agent and voice mode to challenge OpenAI's enterprise dominance

Source link

TAGGED: Aim, bust, calls, Con, Def, Research, Takes, ZTNA
Share This Article
Twitter Email Copy Link Print
Previous Article Salesforce's new CoAct-1 write their own code to accomplish tasks Salesforce’s new CoAct-1 write their own code to accomplish tasks
Next Article The evolution of data center semiconductors: Navigating the AI revolution The evolution of data center semiconductors: Navigating the AI revolution
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

Sustainability Potential of Fiber Infrastructure Design

Lots of the conversations round knowledge heart sustainability appear to inevitably boil right down to…

September 23, 2025

Granata Bio Receives Investment From Gedeon Richter

Granata Bio, a Boston, MA-based biotechnology firm targeted on advancing fertility therapeutics, acquired an funding…

May 15, 2025

Ōura Acquires Sparta Science

Ōura, a San Francisco, CA-based maker of Oura Ring, the good ring that delivers personalised…

November 3, 2024

Savant Labs Raises $18.5M in Series A Funding

Savant Labs, a San Mateo, CA-based supplier of an AI-powered platform serving to enterprise analysts…

February 2, 2025

Optical ground stations capture satellite laser signals, paving way for 1,000-fold faster communications from space

College students working with the cellular optical communications community – TeraNet 3. Credit score: ICRAR…

July 16, 2024

You Might Also Like

Engineering cooling systems for high-density data centres
Global Market

Engineering cooling systems for high-density data centres

By saad
AI services
Global Market

Data center poaching adds to staffing crisis

By saad
It’s time to separate fact from fiction on data centre energy demand
Global Market

It’s time to separate fact from fiction on data centre energy demand

By saad
3D Rendering of digital binary data on microchip with glow circuit board background. Concept of for deep machine learning, crypto currency, hi tech product uses. Big data visualization, cpu processing
Global Market

Arm shifts course, moves into silicon business

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.